(23 Jan 2013) InfoWatch - Digital Citizenship [DC 6]

In past few posts we have learned about securing our computers from cyber threats, today we will see how we can protect mobile devices from cyber threats.

Mobile Security

A mobile device is a hand held computing device that has an
operating system (OS) , where “Apps” and software can be installed for use. Most
hand held devices come equipped with Wi-Fi, Bluetooth and GPS capabilities,
which allow connections to the Internet and other Bluetooth capable devices
such as an automobile or a microphone headset. Examples of mobile devices are
handphone, tablet PC and laptops.

The Do’s…

The Don’ts…

Disable WiFi and Bluetooth when not in use

Use password and encryption to protect your
data

Backup data regularly

Be careful while connecting to unknown
wireless network

Jail breaking/rooting might void your device’s
warranty and expose the operating system to vulnerabilities that could be
exploited by hackers.

AUP Acceptable Use Policy

This policy applies to the use of the ICT resources owned and managed by SST, as well as those brought in for use by users. ICT resources include computer accounts, servers, disk storage, software, email, public folders, network and the Internet. All users MUST comply with this Policy.Click HERE to access.